Software Systems Lab
Software Systems Lab
Software Systems Lab Software Systems Lab

News

The web really isn't worldwide -- every country has different access

Users from certain countries cant visit certain websites not because their governments say so, but because a corporation halfway around the world has made a decision to deny them access. New article by CSE PhD student Allison McDonald at The Conversation. [Full Story]

Related Topics:  Ensafi, Roya  Graduate Students  Halderman, J. Alex  Information Technology  Lab-Systems  

The Malware of the Future Will Have AI Superpowers

The cybersecurity threats of deep learning and neural networks are emerging. Some learning algorithms can be fooled into making simple but crucial errors, which can lead to more malicious attacks later on. Prof. Atul Prakash and collaborators found that by sticking small black and white stickers on stop signs, they could make them undetectable to the AI algorithms used in self-driving cars. [Full Story]

Related Topics:  Lab-Systems  Machine Learning  Prakash, Atul  

A moral code for coders: Should ethics be part of the computer science curriculum?

This airing of Stateside on Michigan Radio includes an audio interview with Bernard A. Galler Professor of EECS HV Jagadish on the moral questions companies should ask when working with private information, and how best to incorporate ethics into coding and computing. [Full Story]

Related Topics:  Jagadish, HV  Lab-Systems  

Online censorship in Saudi Arabia soared after Jamal Khashoggis murder

This story highlights how tools such as Censored Planet, developed by Research Prof. Roya Ensafi, have shed light on state-sponsored censorship activities such as the measures that were put in place recently in Saudi Arabia. [Full Story]

Related Topics:  Cybersecurity  Ensafi, Roya  Lab-Systems  

Using drones, a new software tool can bring LTE networks anywhere

Prof. Z. Morley Mao and alumnus Mehrdad Moradi (PhD CSE 2018) earned a best paper award at this year's ACM MobiCom for their work on SkyCore, a reliable new way to deploy LTE networks using unmanned aerial vehicles (UAVs). The paper, SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE networks, demonstrated a way to connect hotspots on drones with commercial networks and smartphones. [Full Story]

Related Topics:  Autonomous Vehicles  Lab-Systems  Mao, Zhuoqing Morley  Mobile Computing  

The internet security company Dug Song is betting on

UM spinoff Censys, co-founded by Prof. J. Alex Halderman, PhD candidate David Adrian, and alum Zakir Durumeric, monitors all devices connected to the internet for threats. IT staff at companies can use Censys to discover new threats and assess their possible impact. The company attracted early attention from Duo Security's Dug Song, and plans to begin raising a much larger Series A round later in 2019 or in 2020. [Full Story]

Related Topics:  Alumni  Entrepreneurship and Tech Transfer  Graduate Students  Halderman, J. Alex  Lab-Systems  

A look at the election security charges in Georgias governors race

An already tight governors race in Georgia devolved into new chaos Monday after the Republican candidate, who is also the states chief election official, alleged with little evidence that Democrats sought to hack a voter database that will be used in Tuesdays elections. CSE PhD student Matthew Bernhard told the AP that anyone with access to an individual voters personal information could alter that voters record in the system. [Full Story]

Related Topics:  Cybersecurity  Graduate Students  Halderman, J. Alex  Lab-Systems  

A secure future for US elections starts in the classroom

Prof. J. Alex Halderman has been at the forefront of exposing vulnerabilities in electronic voting systems around the world. This Fall, Prof. Halderman and CSE PhD student Matt Bernhard are teaching a new special topics course on election cybersecurity, providing students with a deep examination of the past, present, and future of US elections with perspectives from computer security, tech policy, human factors, and more. [Full Story]

Related Topics:  Cybersecurity  Graduate Students  Halderman, J. Alex  Lab-Systems  Undergraduate Students  

403 Forbidden Study reveals new data on region-specific website blocking practices

New work led by Prof. Roya Ensafi and PhD student Allison McDonald undertook the first wide-scale measurement study of server-side geographic restrictions, or geoblocking, a phenomenon in which websites block access for users in particular countries or regions, a phenomenon on the rise causing Internet balkanization. [Full Story]

Related Topics:  Ensafi, Roya  Graduate Students  Information Technology  Lab-Systems  

J. Alex Halderman on Election Systems and Vulnerabilities

C-SPAN Prof. J. Alex Halderman talked on C-SPAN about voting machine security and vulnerabilities in US election systems. He took questions from live callers and online viewers. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Q&A | Dont kid yourself, U.S. enemies are trying to hack our elections

As a national expert on election system security, Prof. J. Alex Halderman has never shied away from explaining how Americas election systems can and have been hacked. The University of Michigan computer science professor stops short of saying vote counts have been changed, but notes Russians tapped into voter registration lists in some states in 2016, and that he and fellow election-hack experts have demonstrated how state election systems can be infiltrated. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Ahead of important elections, U.S. voting system is still vulnerable to hacking

This CBC Radio Q&A with Prof. J. Alex Halderman focuses on vulnerabilities that exist in the US voting system, as well as telephone voting in Canada and the US. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

The midterms are already hacked. You just dont know it yet.

This in-depth investigation into the US election system reveals frightening vulnerabilities at almost every level. It quotes Prof. J. Alex Halderman and CSE PhD student Matt Bernhard regarding some of vulnerabilities that exist. [Full Story]

Related Topics:  Cybersecurity  Graduate Students  Halderman, J. Alex  Lab-Systems  

Should You Be Afraid of Election Hacking? Here's What Experts Say

This article examines what it means to hack an election and what vulnerabilities exist. Prof. J. Alex Halderman is quoted on where we are with respect to this challenge. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Security Seals Used to Protect Voting Machines Can Be Easily Opened With Shim Crafted from a Soda Can

Election officials say security ties and seals prevent anyone with physical access to voting machines from manipulating them. CSE PhD student Matt Bernhard has shown how he can easily defeat them with just a soda can. [Full Story]

Related Topics:  Graduate Students  Halderman, J. Alex  Lab-Systems  

How hackable are American voting machines? It depends who you ask

Prof. J. Alex Halderman is on a crusade to demonstrate how vulnerable American voting machines are, and some of his arguments are quite compelling. He has rigged mock elections. He has testified to the machines vulnerabilities in Congress and in court. He has even managed to turn a commonly used voting machine into an iteration of the classic arcade game Pac-Man. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Making software failures a little less catastrophic

Prof. Baris Kasikci presented a new technique called REPT REverse debugging with Processor Trace. In the paper REPT: Reverse Debugging of Failures in Deployed Software, Kasikci and collaborators propose a method to recreate the failing program execution to better diagnose the problem at hand. This technique is now deployed on Windows systems and the Windows Debugger platform. [Full Story]

Related Topics:  Kasikci, Baris  Lab-Systems  Software Systems  

Tyche: A new permission model to defend against smart home hacks

Prof. Atul Prakash, CSE PhD student Kevin Eykholt, and CSE alumni Amir Rahmati and Earlence Fernandes have proposed Tyche, a safer app permissions system for smart homes and the Internet of Things. Their paper on this project, Tyche: A Risk-Based Permission Model for Smart Homes, received a Best Paper Award at the IEEE Cybersecurity Development Conference. [Full Story]

Related Topics:  Alumni  Cybersecurity  Graduate Students  Internet of Things  Lab-Systems  Prakash, Atul  

Researchers find way to spy on remote screensthrough the webcam mic

Prof. Daniel Genkin and collaborators have investigated a potential new avenue of remote surveillance that they have dubbed "Synesthesia": a side-channel attack that can reveal the contents of a remote screen, providing access to potentially sensitive information based solely on "content-dependent acoustic leakage from LCD screens." All that is needed is audio picked up by webcam microphones. [Full Story]

Related Topics:  Cybersecurity  Genkin, Daniel  Lab-Systems  Machine Learning  

Hackers can spy on your computer screen just by listening to your webcam's microphone, experts warn

Prof. Daniel Genkin and a team of researchers discovered how hackers can spy on remote computers. LCD displays emit high-frequency sounds that can be recorded by a microphone, including from webcam, smartphone or smart speaker up to 30 ft away. These recordings are then fed into a machine learning algorithm and analyzed to generate an estimation of what's onscreen. [Full Story]

Related Topics:  Cybersecurity  Genkin, Daniel  Lab-Systems  Machine Learning  

To cripple AI, hackers are turning data against itself

Data has powered the artificial intelligence revolution. Now security experts are uncovering worrying ways in which AIs can be hacked to go rogue. PhD student Kevin Eykholt talks to Wired. [Full Story]

Related Topics:  Artificial Intelligence  Graduate Students  Lab-Systems  Machine Learning  Prakash, Atul  

CSE welcomes 9 new faculty

Models of human behavior, scene understanding, cryptography, convolutional neural networks, IoT sensors and systems, and a commitment to innovating in the practice of education. With nine new faculty hires in 2018, Michigan is expanding and strengthening the scope of its research activities in computer science and engineering while simultaneously broadening participation in the field through a focus on innovation and inclusiveness in education. [Full Story]

Related Topics:  Lab-Artificial Intelligence  Lab-Computer Engineering (CE Lab)  Lab-Interactive Systems  Lab-Systems  Lab-Theory of Computation  

Kids at hacking conference show how easily US elections could be sabotaged

In this article, Prof. J. Alex Halderman is quoted on the problems that continue to exist with electronic voting, and why paper ballots should be used. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Hackers are out to jeopardize your vote

Cyberattacks on the 2016 US election caused states to bolster the defenses of their voting systems. Prof. J Alex Halderman explains why this hasn't been enough in this Q&A piece. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Intel processor vulnerability could put millions of PCs at risk

A newly discovered processor vulnerability could potentially put secure information at risk in any Intel-based PC manufactured since 2008. It could affect users who rely on a digital lockbox feature known as Intel Software Guard Extensions, or SGX, as well as those who utilize common cloud-based services. CSE researchers contributed to the discovery of the security hole, called Foreshadow. [Full Story]

Related Topics:  Cybersecurity  Genkin, Daniel  Graduate Students  Kasikci, Baris  Lab-Systems  Wenisch, Thomas  

Spectre-Like Flaw Undermines Intel Processors' Most Secure Element

Wired reports on the security work done by Michigan CSE researchers and their collaborators on a flaw in what was supposed to be a secure enclave in Intel chips. [Full Story]

Related Topics:  Cybersecurity  Genkin, Daniel  Graduate Students  Kasikci, Baris  Lab-Systems  Wenisch, Thomas  

Intel's SGX blown wide open by, you guessed it, a speculative execution attack

ARS Technica reports on the security work done by Michigan CSE researchers and their collaborators on a flaw in what was supposed to be a secure enclave in Intel chips. [Full Story]

Related Topics:  Cybersecurity  Genkin, Daniel  Graduate Students  Kasikci, Baris  Lab-Systems  Wenisch, Thomas  

Is Blockchain Technology the Future of Voting?

West Virginia is experimenting with voting via a blockchain network using smartphones. Prof. J. Alex Halderman cautions that such an approach is not yet truly viable, and that mobile voting using blockchain doesn't address core security problems that are unique to mobile voting. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Sounding the Alarm on the Dangers of Electronic Voting

Prof. J. Alex Halderman explains the dangers inherent with electronic voting machines, especially those without paperbackup, in the BloombergTV interview with Emily Chang. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Voting systems in Wisconsin, a key swing state, can be hacked, security experts warn

This article at WisconsinWatch.org reports in detail on potential vulnerabilities in Wisconsin's voting system, including risks from Russian hacking. It reviews the response of Wisconsin politicians to this prospect as well as the viewpoints of computer scientists. Prof. J. Alex Halderman, an expert in computer, network, and election security, is highlighted in the story. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

The 5 States Most Vulnerable to a 2018 Election Hack

13 states are still using some electronic voting systems without paper backup. Five states rely upon them exclusively. According to Prof. J. Alex Halderman, "If a sophisticated nation state wants to cause chaos on Election Day, theyre probably already in our systems." [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Connected cars can lie, posing a new threat to smart cities

In the article in The Conversation, PhD candidate Qi Alfred Chen and Prof. Z. Morley Mao describe how vulnerabilities in intelligent infrastructure, such as the Intelligent Traffic Signal System being tested by the US Department of Transportation, can create opportunities for hackers to create chaos. [Full Story]

Related Topics:  Autonomous Vehicles  Cybersecurity  Graduate Students  Lab-Systems  Mao, Zhuoqing Morley  

Designing a flexible future for massive data centers

The days of bulky, expensive servers filling up data centers may be numbered: a new approach recreates the power of a large server by linking up and pooling the resources of smaller computers with fast networking technology. [Full Story]

Related Topics:  Big Data  Chowdhury, Mosharaf  Lab-Systems  Mozafari, Barzan  Networking, Operating Systems, and Distributed Systems  

CSE researchers funded to connect music and big data

Four U-M research teams, including two teams led by CSE researchers, will receive support for projects that apply data science tools like machine learning and data mining to the study of music theory, performance, social media-based music making, and the connection between words and music. [Full Story]

Related Topics:  Koutra, Danai  Lab-Artificial Intelligence  Lab-Systems  Lasecki, Walter  Mihalcea, Rada  

Yongjoo Park is runner-up for Jim Gray dissertation award

CSE alumnus and postdoctoral researcher Yongjoo Park (CSE PhD 2017) has been selected as a runner-up for the ACM SIGMOD Jim Gray Doctoral Dissertation Award for his dissertation, "Fast Data Analytics by Learning." [Full Story]

Related Topics:  Alumni  Lab-Systems  

Here's how hackers could cause chaos in this years US midterm elections

This article reviews areas of vulnerability in the US voting system and how these weaknesses can be addressed. Prof. J. Alex Halderman, an expert in computer, network, and election security, is highlighted in the story. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Three CSE faculty selected for Google Faculty Research Award

Profs. Jia Deng, Roya Ensfari, and Manos Kapritsos have been selected to receive the Google Faculty Research Award. The Google Faculty Research Awards Program aims to recognize and support world-class, permanent faculty pursuing cutting-edge research. [Full Story]

Related Topics:  Deng, Jia  Ensafi, Roya  Kapritsos, Manos  Lab-Artificial Intelligence  Lab-Systems  

I hacked an election. So can the Russians.

Professor Alex Halderman and the New York Times staged a mock election to demonstrate voting machine vulnerability. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Michigan researchers discover vulnerabilities in next-generation connected vehicle technology

The US Department of Transportation has started implementing I-SIG, a vehicle-to-infrastructure technology that uses real-time vehicle trajectory data to intelligently control the duration and sequence of traffic signals. With the use of this system, comes vulnerabilities, and Michigan researchers have demonstrated that even one single cyberattack can greatly manipulate the intelligent traffic control algorithm in the current I-SIG system and cause severe traffic jams. [Full Story]

Related Topics:  Lab-Systems  Mao, Zhuoqing Morley  

CSE PhD student Matt Bernhard on the Facebook data breach

In this video, CSE PhD Student Matt Bernhard weighs in on the matter Facebook data harvesting, such as that done by Cambridge Analytica. [Full Story]

Related Topics:  Cybersecurity  Graduate Students  Lab-Systems  

Security of State Voter Rolls a Concern as Primaries Begin

This article describes steps being taken in Illinois, the lone state known to have its state election system breached in a hacking effort, regarding its election systems. It quotes Prof. J. Alex Halderman, who points out that many of the same weaknesses present in 2016 remain. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Election audits to debut in Mich. 2018 race

This article describes new measures to bolster security for Michigans 2018 midterm elections. Prof. J. Alex Halderman points out that additional progress can occur in the stat's process for auditing of paper ballots. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Comcast offers 1-gigabit service in SE Mich.

In this news report, Prof. Mosharaf Chowdhury comments on the potential impact of Comcast's forthcoming 1-gigabit residential and business service. [Full Story]

Related Topics:  Chowdhury, Mosharaf  Data and Computing  Lab-Systems  Networking, Operating Systems, and Distributed Systems  

The Myth of the Hacker-Proof Voting Machine

This article describes the security holes that exist in today's electronic voting machines, including both the shortcomings of voting systems that do not provide paper backup and those of the systems that transmit electronic votes to counting centers. It quotes Prof. J. Alex Halderman, who points to flaws in the protections for vote transmission systems put forth by vendors of paperless systems. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Collaborative master's program in data science announced

Developed and taught collaboratively by the faculty of the CSE Division of EECS in the College of Engineering, the Department of Statistics in the College of LSA, the Department of Biostatistics in the School of Public Health, and the School of Information, the Data Science master's program is now accepting applications for Fall 2018. [Full Story]

Related Topics:  Big Data  Data and Computing  Education  Lab-Systems  

Michigan researchers awarded 2018 Applied Networking Research Prize for their work on speeding up the mobile web

A team of researchers, including Prof. Harsha Madhyastha and CSE graduate students Vaspol Ruamviboonsuk and Muhammed Uluyol have received the Applied Networking Research Prize (ANRP) for their paper, "Vroom: Accelerating the Mobile Web with Server-Aided Dependency Resolution. [Full Story]

Related Topics:  Graduate Students  Lab-Systems  Madhyastha, Harsha  

Internet-scanning U-M startup pioneers new approach to cybersecurity

Ann Arbor-based Censys has launched based on work done over the past 5 years in Prof. J. Alex Halderman's lab. Censys is the first commercially available internet-wide scanning tool. It helps IT experts working to secure large networks, which are composed of a constantly changing array of devices ranging from servers to smartphones and internet-of-things devices. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

CSE Researchers Funded to Enhance Online Communication

Profs. Danai Koutra and Walter Lasecki have been awarded two grants from Trove.ai, an Ann-Arbor based artificial intelligence startup, to develop novel methods and tools that will unleash the power of online communication. [Full Story]

Related Topics:  Koutra, Danai  Lab-Artificial Intelligence  Lab-Systems  Lasecki, Walter  

New bill could finally get rid of paperless voting machines

Prof. J. Alex Halderman is quoted on the the vulnerabilities that exist in voting machines, why paper backup is a practical solution, and the approaches that should be taken in auditing election results. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

A Case Against Net Neutrality

In this opinion piece, Prof. Harsha Madhyastha makes that point that an entirely neutral net is not necessarily an efficient net. In order for us to operate optimally, he says we need to answer the question: How can we legally define the permissible ways an ISP could throttle or prioritize traffic in a manner that does not place undue burden on ISPs, yet is verifiable by third parties? [Full Story]

Related Topics:  Lab-Systems  Madhyastha, Harsha  Networking, Operating Systems, and Distributed Systems  

An armed robber's Supreme Court case could affect all Americans digital privacy for decades to come

Prof. HV Jagadish writes in this article for The Conversation about the data privacy challenges presented by a world in which our devices continuously record and track our activities. [Full Story]

Related Topics:  Big Data  Cybersecurity  Jagadish, HV  Lab-Systems  Mobile Computing  

HV Jagadish Elected as Fellow of the American Association for the Advancement of Science

HV Jagadish, the Bernard A. Galler Collegiate Professor of Electrical Engineering and Computer Science and a distinguished scientist at the Michigan Institute for Data Science, has been elected as a fellow of the AAAS for distinguished contributions to database systems and many aspects of Big Data and data science, specifically for new ways to share data. [Full Story]

Related Topics:  Big Data  Data and Computing  Jagadish, HV  Lab-Systems  

Securing the vote: How 'paper' can protect US elections from foreign invaders

This story on security problems with voting quotes Prof. J. Alex Halderman, who says that "Although there is no evidence that any past election in the United States has been changed by hacking, it is in my opinion only a matter of time until one is." [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

VAuth tech feels your voice in your skin

This article describes VAuth, the new thechnology that supplements voice authorization developed in the lab of Prof. Kang G. Shin. [Full Story]

Related Topics:  Cybersecurity  Lab-Systems  Networking, Operating Systems, and Distributed Systems  Shin, Kang G.  

Why the Krack Wi-Fi Mess Will Take Decades to Clean Up

This article quotes Prof. Kevin Fu, who says "For the general sphere of IoT devices, like security cameras, we're not just underwater. We're under quicksand under water." [Full Story]

Related Topics:  Cybersecurity  Fu, Kevin  Lab-Systems  

Wearables to boost security of voice-based log-in

Voice authentication is easy to spoof. New technology could help close this open channel. [Full Story]

Related Topics:  Cybersecurity  Lab-Systems  Networking, Operating Systems, and Distributed Systems  Shin, Kang G.  

Manos Kapritsos and Collaborators Win USENIX Security Paper Award

A team of researchers including Prof. Manos Kapritsos has won a Distinguished Paper Award at the 2017 USENIX Security Symposium for Vale, a new programming language and tool that supports flexible, automated verification of high-performance cryptographic assembly code. [Full Story]

Related Topics:  Cybersecurity  Kapritsos, Manos  Lab-Systems  

'Learning Database' Speeds Queries from Hours to Seconds

University of Michigan researchers developed software called Verdict that enables existing databases to learn from each query a user submits, finding accurate answers without trawling through the same data again and again. Verdict allows databases to deliver answers more than 200 times faster while maintaining 99 percent accuracy. In a research environment, that could mean getting answers in seconds instead of hours or days. [Full Story]

Related Topics:  Big Data  Lab-Systems  Mozafari, Barzan  

Phone Browsing Could Become Faster, May Use Less Data With Smart Code

This article reports on Vroom, software developed by computer scientists including Prof. Harsha Madhyastha and CSE graduate student Vaspol Ruamviboonsuk. Vroom improves mobile browsing speed by optimizing the end-to-end interaction between smart devices and web servers. [Full Story]

Related Topics:  Lab-Systems  Madhyastha, Harsha  Mobile Computing  

Codeon is the Intelligent Assistant for Software Developers

Researchers, including Profs. Walter S. Lasecki and Steve Oney, and graduate students Yan Chen and Yin Xie have created Codeon, a system that enables more effective task hand-off between end-user developers and remote helpers by allowing asynchronous responses to on-demand requests. With Codeon, developers can request help by speaking their requests aloud within the context of their Integrated Development Environment. [Full Story]

Related Topics:  Lab-Artificial Intelligence  Lab-Systems  Lasecki, Walter  

Accelerating the Mobile Web: Vroom Software Could Double its Speed

Vroom software, developed by computer scientists including Prof. Harsha Madhyastha and CSE graduate student Vaspol Ruamviboonsuk, can dramatically speed the loading of webpages on mobile devices. [Full Story]

Related Topics:  Lab-Systems  Madhyastha, Harsha  Mobile Computing  

Kurator Will Help You Curate Your Personal Digital Content

People capture photos, audio recordings, video, and more on a daily basis, but organizing all these digital artifacts quickly becomes a daunting task. Automated solutions struggle to help us manage this data because they cannot understand its meaning. Profs. Walter Lasecki and Mark Ackerman have helped create Kurator, a hybrid intelligence system leveraging mixed-expertise crowds to help families curate their personal digital content. [Full Story]

Related Topics:  Ackerman, Mark  Lab-Artificial Intelligence  Lab-Systems  Lasecki, Walter  

Movie Design for Specific Target Audiences

Creating products that satisfy the market is critical to companies as it determines their success and revenue. Currently, experts use their judgment to estimate solutions to designing a new product that will satisfy customers, but this does not scale or allow leveraging massive datasets. Prof. Danai Koutra and her colleagues sought to identify how they can design new movies with features tailored to a specific user population. [Full Story]

Related Topics:  Koutra, Danai  Lab-Artificial Intelligence  Lab-Systems  

CRA Board Member Highlight: H. V. Jagadish

HV Jagadish, Bernard A. Galler Collegiate Professor of Electrical Engineering and Computer Science, has been profiled in the August issue of CRA's Computing Research News. [Full Story]

Related Topics:  Big Data  Jagadish, HV  Lab-Systems  

In fight for free speech, researchers test anti-censorship tool built into the internet's core

This article describes an implementation of TapDance, a method of anticensorship deployment that is built into the very core of the internet itself. By building TapDance into the servers and routers that underpin the Internet, censorship would become impractical. TapDance's development has been led by Prof. J. Alex Halderman. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

CHORUS: The Crowd-Powered Conversational Assistant

Prof. Walter Lasecki and his colleagues have developed a crowd-powered conversational assistant, Chorus, and deployed it to see how users and workers would interact together when mediated by the system. Chorus is capable of providing users with relevant responses instead of merely search results by recruiting workers on demand, who in turn decide what the best response is for each user sentence. [Full Story]

Related Topics:  Lab-Artificial Intelligence  Lab-Systems  Lasecki, Walter  

Social Interaction Patterns Provide Clues to Real Life Changes

Researchers including Prof. Danai Koutra have explored the dynamics of individual user interactions in social networks by creating iNET, a comprehensive analytic and visualization framework that provides personalized insights into user behavior. The researchers view their work as a first step towards fully exploring the amount and type of information that can be extracted from the online social footprint of a person. [Full Story]

Related Topics:  Koutra, Danai  Lab-Artificial Intelligence  Lab-Systems  

U.S. elections are an easier target for Russian hackers than once thought

This article on voting system security quotes Prof. J. Alex Halderman, who says of the prospect of election tampering that "the technical ability is there and we wouldn't be able to catch it. The state of technical defense is very primitive in our election system now." [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Heres exactly how Russia can hack the 2018 elections

Vulnerabilities in our voting system need to be addressed swiftly, according to experts in the field, including Prof. J. Alex Halderman. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Apps available for your smartphone could steal your personal information

WXYZ Detroit reports on work by UM researchers that has exposed dangerous open ports in mobile platforms that can be taken advantage of by hackers. [Full Story]

Related Topics:  Cybersecurity  Graduate Students  Lab-Systems  Mao, Zhuoqing Morley  Mobile Computing  

Let's Encrypt Issues 100 Millionth Security Certificate

The Internet is more secure thanks to Let's Encrypt, the certificate authority founded by Prof. J. Alex Halderman and his collaborators. Since launching in Jan. 2016, Let's Encrypt has issued 100 million certificates. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Prof. J. Alex Halderman Testifies in Front of Senate Intelligence Committee on Secure Elections

Prof. J. Alex Halderman testified in front of the Senate Intelligence Committee as a part of the broader Russian hacking investigation. His remarks focused vulnerabilities in the US voting system and a policy agenda for securing the system against the threat of hacking. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

How to prevent Russian hackers from attacking the 2018 election

In this commentary piece in the Chicago Tribune, Prof. J. Alex Halderman and Justin Talbot-Zorn make the case for a straightforward policy agenda to secure America's voting systems against the threat of hackers. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

If Voting Machines Were Hacked, Would Anyone Know?

In the article, Prof. J. Alex Halderman points out how electronic voting systems even those not connected to the Internet can be compromised. One path for hackers is to attack the computers that are used to program the ballots, which are later transferred to voting machines via memory cards. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Breakthrough for Large Scale Computing: Memory Disaggregation Made Practical

CSE researchers have introduced Infiniswap, the first system to scalably implement cluster-wide memory disaggregation, whereby the memory of all the servers in a computing cluster is transparently exposed as a single memory pool to all the applications in the cluster. [Full Story]

Related Topics:  Chowdhury, Mosharaf  Lab-Systems  Networking, Operating Systems, and Distributed Systems  Shin, Kang G.  Software Systems  

Brian Noble Named Chair of Computer Science and Engineering

Influential educator and computer scientist Brian Noble has been selected as the new chair of the Computer Science and Engineering division of the Department of Electrical Engineering and Computer Science at the University of Michigan. [Full Story]

Related Topics:  Lab-Systems  Noble, Brian  

Apple acquires AI company Lattice Data, a specialist in unstructured dark data, for $200M

CSE Prof. Michael Cafarella is a co-founder of the startup Lattice Data, which builds on statistical inference and machine learning to solve problems using dark data. Apple has acquired Lattice, which recently emerged from stealth mode, for $200M. [Full Story]

Related Topics:  Cafarella, Michael  Data and Computing  Lab-Systems  

Apple Just Acquired This Little-Known Artificial Intelligence Startup

CSE Prof. Michael Cafarella is a co-founder of the startup Lattice Data, which builds on statistical inference and machine learning to solve problems using dark data. Apple has acquired Lattice, which recently emerged from stealth mode, for $200M. [Full Story]

Related Topics:  Cafarella, Michael  Data and Computing  Lab-Systems  

Smartphone security hole: "Open port" backdoors are common

The College of Engineering reports on work by computer science security researchers which has revealed that so-called "open ports" are much more vulnerable to security breaches than previously thought. [Full Story]

Related Topics:  Cybersecurity  Lab-Systems  Mao, Zhuoqing Morley  Mobile Computing  Networking, Operating Systems, and Distributed Systems  

Hundreds of popular Android apps have open ports, making them prime targets for hacking

This article reports on the work done by CSE researchers Yunhan Jack Jia, Qi Alfred Chen, Yikai Lin, Chao Kong, and Prof. Z. Morley Mao in characterizing a widespread vulnerability in popular Android apps. [Full Story]

Related Topics:  Cybersecurity  Graduate Students  Lab-Systems  Mao, Zhuoqing Morley  Mobile Computing  Networking, Operating Systems, and Distributed Systems  

Open Ports Create Backdoors in Millions of Smartphones

This article reports on work by CSE researchers who have characterized a widespread vulnerability in the software that runs on mobile devices which could allow attackers to steal contact information, security credentials, photos, and other sensitive data by using open ports to create backdoors. [Full Story]

Related Topics:  Cybersecurity  Graduate Students  Lab-Systems  Mao, Zhuoqing Morley  Mobile Computing  Networking, Operating Systems, and Distributed Systems  

An Obscure Flaw Creates Backdoors in Millions of Smartphones

CSE researchers have characterized a widespread vulnerability in the software that runs on mobile devices which could allow attackers to steal contact information, security credentials, photos, and other sensitive data, and also to install malware and to perform malicious code execution which could be used in large-scale attacks. [Full Story]

Related Topics:  Cybersecurity  Graduate Students  Lab-Systems  Mao, Zhuoqing Morley  Mobile Computing  Networking, Operating Systems, and Distributed Systems  

Hacking with Sound Waves

CSE researchers have demonstrated a new way of using sound to interfere with devices containing accelerometers, such as smartphones and self-driving cars. This presents a new avenue for hackers to use in compromising devices to steal information or disrupt communication. [Full Story]

Related Topics:  Cybersecurity  Embedded Systems  Fu, Kevin  Internet of Things  Lab-Computer Engineering (CE Lab)  Lab-Systems  

Why India Needs A Paper Trail For Free And Fair Elections

This article in the Indian edition of the Huffington Post, references the work that Prof. J. Alex Halderman and his collaborators did in 2010 to demonstrate vulnerabilities in India's "tamper-proof" electronic voting machines. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Courage to Resist: The High-Stakes Adventures of J. Alex Halderman

This story by Randy Milgrom at the UM College of Engineering profiles Prof. J. Alex Halderman and his work in the area of Digital Democracy. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Open Ports Act As Security Wormholes Into Mobile Devices

Computer science and engineering researchers at the University of Michigan have for the first time characterized a widespread vulnerability in the software that runs on mobile devices which could allow attackers to steal contact information, security credentials, photos, and other sensitive data, and also to install malware and to perform malicious code execution which could be used in large-scale attacks. [Full Story]

Related Topics:  Cybersecurity  Graduate Students  Lab-Systems  Mao, Zhuoqing Morley  Mobile Computing  Networking, Operating Systems, and Distributed Systems  

The next cyberattack could render your anti-virus and encryption software useless

Researchers including Prof. Kevin Fu and CSE graduate student Timothy Trippel have demonstrated a new way of using sound to interfere with devices containing accelerometers, such as smartphones. This presents a new avenue for hackers to use in compromising devices to steal information or disrupt communication. [Full Story]

Related Topics:  Cybersecurity  Fu, Kevin  Lab-Computer Engineering (CE Lab)  Lab-Systems  

Smartphone Accelerometers Can Be Fooled by Sound Waves

This article features work done by Prof. Kevin Fu and his collaborators in which they demonstrate a way to take control of or influence devices such as smartphones through the use of sound waves. [Full Story]

Related Topics:  Cybersecurity  Embedded Systems  Fu, Kevin  Internet of Things  Lab-Computer Engineering (CE Lab)  Lab-Systems  

It's Possible to Hack a Phone With Sound Waves, Researchers Show

This article features work done by Prof. Kevin Fu and his collaborators in which they demonstrate a way to take control of or influence devices such as smartphones through the use of sound waves. The Department of Homeland Security is expected to issue a security advisory alert for affected chips. [Full Story]

Related Topics:  Cybersecurity  Embedded Systems  Fu, Kevin  Lab-Computer Engineering (CE Lab)  Lab-Systems  

Sonic Cyber Attacks Show Security Holes in Ubiquitous Sensors

Sound waves can be used to hack into critical sensors used in a broad array of technologies including smartphones, automobiles, medical devices, and the Internet of Things, according to research performed by Prof. Kevin Fu, Prof. Peter Honeyman, CSE graduate student Timothy Trippel, and their collaborators at the University of South Carolina. [Full Story]

Related Topics:  Cybersecurity  Embedded Systems  Fu, Kevin  Graduate Students  Internet of Things  Lab-Computer Engineering (CE Lab)  Lab-Systems  

Barzan Mozafari Named Morris Wellman Faculty Development Professor

Barzan Mozafari, assistant professor in Computer Science and Engineering, has been named a Morris Wellman Faculty Development Professor. The professorship is awarded to junior faculty members in recognition of outstanding contributions to teaching and research. [Full Story]

Related Topics:  Big Data  Data and Computing  Lab-Systems  Mozafari, Barzan  

Professor Who Urged an Election Recount Thinks Trump Won, but Voting Integrity Still Concerns Him

This article in the Chronicle of Higher Education includes a Q and A with Prof. J. Alex Halderman on the 2016 presidential election recount and on the challenges ahead for election integrity. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Harsha Madhyastha Selected for Google Faculty Award

Prof. Harsha V. Madhyastha has been awarded a 2017 Google Faculty Research Award for his work in enabling the deployment of low-latency web services in the cloud. It is his third research award from Google. [Full Story]

Related Topics:  Lab-Systems  Madhyastha, Harsha  Networking, Operating Systems, and Distributed Systems  Software Systems  Warehouse-Scale and Parallel Systems  

Inside the Recount

This story provides an in-depth, inside view of how the recount effort for the 2016 presidential election - of which Prof. J. Alex Halderman was a primary participant - was sparked, how it came to focus on three states, what the results showed, and what we can learn from it all. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Our Voting System Is Hackable by Foreign Powers

This article reviews the vulnerabilities that currently exist in our voting system. It references Prof. J. Alex Halderman, who has stated that he and his students could have changed the results of the November election. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

CSE and Local Community Turn Out For Science on Screen Movie and Lecture

On Wednesday, January 25, the U-M CSE and local Ann Arbor communities turned out for a special Science on Screen event at downtown Ann Arbor's Michigan Theater. The program included a screening of I Voted? and a lecture by Prof. J. Alex Halderman on security risks in America's election system and his analysis of the results from the 2016 presidential election recounts, which he helped to organize. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Systems  

Z. Morley Mao Receives CoE George J. Huebner, Jr. Research Excellence Award

Prof. Z. Morley Mao has been selected to receive the George J. Huebner, Jr. Research Excellence Award from the College of Engineering for her work in the areas of mobile computing, security, networking, distributed systems, SDN, and cloud computing. [Full Story]

Related Topics:  Lab-Systems  Mao, Zhuoqing Morley  

The 2016 US Election Wasnt Hacked, but the 2020 Election Could Be

Prof. Alex Halderman is quoted in this article which reports on the recent Chaos Communication Congress. "Developing an attack for one of these machines is not terribly difficult," says Prof. Halderman. "I and others have done it again and again in the laboratory. All you need to do is buy one government surplus on eBay to test it out." [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Five things that got broken at the oldest hacking event in the world

Chaos Communications Congress is the world's oldest hacker conference, and Europe's largest. Every year, thousands of hackers gather in Hamburg to share stories, trade tips and discuss the political, social and cultural ramifications of technology. This story quotes Prof. J. Alex Halderman, who with his student Matt Bernhard, has studied the security of the past US presidential election. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Systems  

Peter M. Chen to Serve as Interim Chair of Computer Science and Engineering

Prof. Peter M. Chen, Arthur F. Thurnau Professor of Electrical Engineering and Computer Science, will assume the role of Interim Chair of Computer Science and Engineering effective January 1, 2017. [Full Story]

Related Topics:  Chen, Peter M.  Lab-Systems